Blog Post

Exchange Team Blog
4 MIN READ

Released: February 2023 Exchange Server Security Updates

The_Exchange_Team's avatar
The_Exchange_Team
Platinum Contributor
Feb 14, 2023

Microsoft has released Security Updates (SUs) for vulnerabilities found in:

  • Exchange Server 2013
  • Exchange Server 2016
  • Exchange Server 2019

SUs are available in a self-extracting auto-elevating .exe package, as well as the original update packages (.msp files), which can be downloaded from the Microsoft Update Catalog.

SUs are available for the following specific versions of Exchange Server:

  • Exchange Server 2013 CU23 (note that support and availability of SUs end on April 11, 2023)
  • Exchange Server 2016 CU23
  • Exchange Server 2019 CU11 and CU12 

Note: Build availability issues have been resolved. If your server downloaded the February SU via Windows/ Microsoft update before February 15 8 AM Pacific time, you might see the February update be offered again. Installing the updated package will bring your server forward to current February builds (verify using Health Checker after installation). The Download Center .exe update packages were (and still are) correct.

The February 2023 SUs address vulnerabilities responsibly reported to Microsoft by security partners and found through Microsoft’s internal processes. Although we are not aware of any active exploits in the wild, our recommendation is to immediately install these updates to protect your environment.

These vulnerabilities affect Exchange Server. Exchange Online customers are already protected from the vulnerabilities addressed in these SUs and do not need to take any action other than updating Exchange servers in their environment.

More details about specific CVEs can be found in the Security Update Guide (filter on Exchange Server under Product Family).

Update installation

The following update paths are available:

Known issues with this release

Issues resolved in this release

FAQs

Our organization is in Hybrid mode with Exchange Online. Do we need to do anything?
Exchange Online is already protected, but this SU needs to be installed on your Exchange servers, even if they are used only for management purposes. If you change the auth certificate after installing the February 2023 SU, you should re-run the Hybrid Configuration Wizard.

The last SU we installed is a few months old. Do we need to install all SUs in order, to install the latest one?
SUs are cumulative. If you are running a CU supported by the SU, you do not need to install all SUs in sequential order; simply install the latest SU. Please see this update FAQ blog post for more information.

Do we need to install SUs on all Exchange Servers within our organization? What about ‘Management Tools only’ machines?
Our recommendation is to install Security Updates on all Exchange Servers as well as servers or workstations running Exchange Management Tools only, which will ensure that there is no incompatibility between management tools clients and servers.

Updates to this post:

  • 3/3/2023: Added the resolved issue for customers who were blocked from enabling Extended Protection and using archiving
  • 3/2/2023: Added a known issue related to ECP add-ins page and non-default applications
  • 2/17/2023: Linked to the new KB article talking about the EWS crash
  • 2/16/2023: Clarification that we recommend that customers impacted by the EWS crash keep the February SU installed and implement the posted workaround
  • 2/16/2023: Clarified the EWS crash workaround
  • 2/16/2023: Added a known issue related to EWS crash and the workaround
  • 2/15/2023: Updated the note about download availability; all update packages should now be correct.
  • 2/15/2023: Added a note that there is a build availability problem; please use Download Center until this is resolved.

The Exchange Server Team

Updated Mar 03, 2023
Version 13.0

199 Comments

  • maafraz No, there is not a specific CVE that requires turning this feature on to address a vulnerability. As of now, Serialized Data Signing of PowerShell payload is a "defense in depth" feature. BTW - when in doubt, always run Health Checker, it'll tell you if anything is needed to address any specific CVEs: https://aka.ms/ExchangeHealthChecker 

  • maafraz's avatar
    maafraz
    Copper Contributor

    Thanks Nino for prompt response

    although it’s an optional feature, does it require to enable this feature to protect System from all listed vulnerabilities till date?

    Thanks,

     

  • ceantuco Nope. Please see "Known issues" and "Issues resolved in this update" in the blog post above. I want to be clear that this (Queue Viewer) issue is related to certificate signing feature and not the SU.

  • ceantuco's avatar
    ceantuco
    Iron Contributor

    Hi Nino_Bilic , 

     

    Has the Queue Viewer issue after enabling the Serialized Data Signing feature been fixed? 

    Please advise

    Thanks!

  • maafraz No, this feature is not enabled by default at this time. It is not a mandatory feature, it is recommended.

  • maafraz's avatar
    maafraz
    Copper Contributor

    Hi Team,

    does this update enable Power Shell serialization signing by default if we install directly the Exchange 2019 servers that doesn’t have Jan 2023 SU installed? If NOT

    does it mandatory to have PS serialization signing enable on the Exchange servers after install Feb 2023 SU?

    thanks,